Results 71 to 80 of about 2,486,163 (328)

Research on Security of Virtualization on Cloud Computing

open access: yesDianxin kexue, 2015
In recent years,followed by developing and popularizing of cloud computing service,the security problems appear. One of the problems,virtualization security,draws most attention of cloud services providers and security manufacturers.
Xiaodi Wang   +4 more
doaj   +2 more sources

A Survey on Cloud Security Issues and Techniques [PDF]

open access: yesInternational Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.1, February 2014, 2014
Today, cloud computing is an emerging way of computing in computer science. Cloud computing is a set of resources and services that are offered by the network or internet. Cloud computing extends various computing techniques like grid computing, distributed computing. Today cloud computing is used in both industrial field and academic field.
arxiv  

Rotation‐Based Snap‐Fit Mechanical Metamaterials

open access: yesAdvanced Science, EarlyView.
This article introduces a rotational snap‐fit structure composed of a circular cantilever beam snap‐fit and a circular groove. It demonstrates multistability during the rotation process. This innovative design has potential applications in various fields, such as mechanical metamaterials, shape deformation, and robotic grippers, showcasing its ...
Rui Xu   +6 more
wiley   +1 more source

A Preliminary Study On Emerging Cloud Computing Security Challenges [PDF]

open access: yesarXiv, 2018
Cloud computing is the internet based provisioning of the computing resources, software, and information on demand. Cloud Computing is referred to as one of most recent emerging paradigms of computing utilities. Since Cloud computing is the dominant infrastructure of the shared services over the internet, it is important to be aware of the security ...
arxiv  

Secure Cloud Storage Protocols with Data Dynamics Using Secure Network Coding Techniques [PDF]

open access: yes, 2016
In the age of cloud computing, cloud users with limited storage can outsource their data to remote servers. These servers, in lieu of monetary benefits, offer retrievability of their clients' data at any point of time. Secure cloud storage protocols enable a client to check integrity of outsourced data.
arxiv   +1 more source

Artificial Intelligent‐Enhanced Metabolite Profiling for Intraoperative IDH1 Genotyping in Glioma Using an Orthogonally Responsive SERS Probe

open access: yesAdvanced Science, EarlyView.
This study presents a novel approach for intraoperative identification of the IDH1 genotype in glioma patients using a surface‐enhanced Raman scattering (SERS) probe to measure glutathione and hydrogen peroxide. By integrating AI‐driven deep learning algorithms, the method achieves rapid and accurate genotype differentiation, offering the potential to ...
Hang Yin   +14 more
wiley   +1 more source

AN QUALITY BASED ENHANCEMENT OF USER DATA PROTECTION VIA FUZZY RULE BASED SYSTEMS IN CLOUD ENVIRONMENT [PDF]

open access: yesICTACT Journal on Soft Computing, 2016
So far, in cloud computing distinct customer is accessed and consumed enormous amount of services through web, offered by cloud service provider (CSP). However cloud is providing one of the services is, security-as-a-service to its clients, still people ...
R Poorva Devi, S Rajalakshmi
doaj  

Security Pattern for Cloud SaaS: From System and Data Security to Privacy Case Study in AWS and Azure

open access: yesComputers, 2019
The Cloud is fast becoming a popular platform for SaaS, a popular software delivery model. This is because the Cloud has many advantages over the traditional private infrastructure, such as increased flexibility, no maintenance, less management burden ...
Annanda Rath   +3 more
doaj   +1 more source

Ultra‐Stable and Highly Luminescent Perovskite for Multi‐Color Ultraviolet Single‐Pixel Imaging

open access: yesAdvanced Science, EarlyView.
In this work, a novel strategy is presented for co‐passivation of perovskites via Mg2+ and SEBS, achieving high PLQY and enhanced stability in perovskite films, utilizing Fourier compressed sensing technology, integrated with single‐pixel imaging technology for UV detection and imaging.
Bin Xu   +9 more
wiley   +1 more source

Enhancing Cloud-Based IoT Security Through Trustworthy Cloud Service: An Integration of Security and Reputation Approach

open access: yesIEEE Access, 2019
The Internet of Things (IoT) provides a new paradigm for the development of heterogeneous and distributed systems, and it has increasingly become a ubiquitous computing service platform.
Xiang Li   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy